CVE-2025-48343
Aaron · Aaron Axelsen WPMU Ldap Authentication
**A high-severity Cross-Site Request Forgery (CSRF) vulnerability in Aaron Axelsen WPMU Ldap Authentication allows for Stored XSS, posing a risk of administrative account compromise.**.
Executive summary
A high-severity Cross-Site Request Forgery (CSRF) vulnerability in Aaron Axelsen WPMU Ldap Authentication allows for Stored XSS, posing a risk of administrative account compromise.
Vulnerability
The plugin is susceptible to a Cross-Site Request Forgery (CSRF) attack. An unauthenticated attacker can craft a malicious request that, when executed by an authenticated administrator's browser, injects a persistent malicious script (Stored XSS) into the plugin's configuration or related settings.
Business impact
This vulnerability is rated High severity with a CVSS score of 7.1. A successful exploit could allow an attacker to execute scripts within an administrator's session, potentially leading to the theft of session cookies, modification of LDAP settings, or creation of unauthorized admin accounts. This could result in a complete compromise of the website's authentication system.
Remediation
Immediate Action: The primary remediation is to update the WPMU Ldap Authentication plugin to the latest patched version immediately.
Proactive Monitoring: Regularly audit plugin configurations for unauthorized changes. Monitor administrative logs for suspicious activity, especially related to user authentication settings.
Compensating Controls: Deploying a Web Application Firewall (WAF) with up-to-date rules against CSRF and XSS attacks can provide an effective, immediate layer of defense.
Exploitation status
Public Exploit Available: false
Analyst recommendation
This vulnerability represents a significant threat to the security of the website's user management and authentication. The High severity rating requires an urgent response. Administrators must prioritize applying the vendor-supplied update to prevent attackers from compromising the site.